Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
61
4
te c h n o l o g y
4.1 Introduction
Vulnerability assessment technology comes in multiple flavors designed
for various deployment strategies. ese strategies are largely the result
of restrictions imposed by the business-operating model. Factors such
as the distribution of facilities and organization of infrastructure have
a major influence on the technology choices made. Cost and efficiency
are also ever-present factors in any decision. e selection criteria will
be discussed in the next chapter. In this chapter, we will discuss the
variety of technologies and the unique features and issues of each.
ere are five common, industry-accepted approaches to vulner-
ability management (VM) technology:
Active scanning•
Passive assessment•
Agents•
Hy
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512